From acf7a7d2186d94ad48acc27d3e55b6ee94619c45 Mon Sep 17 00:00:00 2001
From: Tom Prince <tom.prince@private.storage>
Date: Wed, 25 Aug 2021 11:03:22 -0600
Subject: [PATCH] stuff

---
 morph/grid/local/README.rst            | 15 ++++
 morph/grid/local/arion-compose.nix     | 78 +++++++++++++++++++++
 morph/grid/local/arion-pkgs.nix        |  5 ++
 morph/grid/local/grid.nix              | 24 ++++---
 morph/grid/local/public-keys/users.nix |  3 +-
 morph/grid/local/secrets.nix           | 24 +++++++
 morph/grid/production/grid.nix         | 12 ++--
 morph/grid/testing/grid.nix            | 12 ++--
 morph/lib/customize-issuer.nix         | 49 ++-----------
 morph/lib/customize-monitoring.nix     | 21 ++----
 morph/lib/customize-storage.nix        | 25 +++----
 morph/lib/default.nix                  |  1 +
 morph/lib/deployment.nix               | 24 +++++++
 morph/lib/hardware-docker.nix          | 33 +++++++++
 morph/lib/hardware-virtual.nix         | 64 +++++++++--------
 morph/lib/issuer.nix                   | 95 ++++++++++++++------------
 morph/lib/monitoring.nix               |  2 +
 morph/lib/storage.nix                  | 83 ++++++++++++----------
 shell.nix                              |  3 +-
 19 files changed, 373 insertions(+), 200 deletions(-)
 create mode 100644 morph/grid/local/arion-compose.nix
 create mode 100644 morph/grid/local/arion-pkgs.nix
 create mode 100644 morph/grid/local/secrets.nix
 create mode 100644 morph/lib/deployment.nix
 create mode 100644 morph/lib/hardware-docker.nix

diff --git a/morph/grid/local/README.rst b/morph/grid/local/README.rst
index d30d8766..eb99d500 100644
--- a/morph/grid/local/README.rst
+++ b/morph/grid/local/README.rst
@@ -49,3 +49,18 @@ Use the local development environment
     morph upload-secrets grid.nix
 
   You should now be able to log in with the users and keys you set in your ``users.nix`` file.
+
+Docker environment
+``````````````````
+
+1. Enter the morph local grid directory::
+
+    cd morph/grid/local
+
+2. Enter the project's nix-shell::
+
+    nix-shell ../../../shell.nix
+
+3. Start the services::
+
+   arion up
diff --git a/morph/grid/local/arion-compose.nix b/morph/grid/local/arion-compose.nix
new file mode 100644
index 00000000..1f8eb209
--- /dev/null
+++ b/morph/grid/local/arion-compose.nix
@@ -0,0 +1,78 @@
+{lib, ...}:
+let
+  gridlib = import ../../lib;
+
+  rawConfig = lib.importJSON ./config.json;
+  config = rawConfig // {
+    sshUsers = import ./public-keys/users.nix;
+
+    # Convert relative paths to absolute so library code can resolve names
+    # correctly.
+    publicKeyPath = toString ./. + "/${rawConfig.publicKeyPath}";
+    privateKeyPath = toString ./. + "/${rawConfig.privateKeyPath}";
+  };
+
+  # Configure deployment management authorization for all systems in the grid.
+  deployment = {
+    services.private-storage.deployment = {
+      authorizedKey = builtins.readFile "${config.publicKeyPath}/deploy_key.pub";
+      gridName = "local";
+    };
+    services.private-storage.sshUsers = config.sshUsers;
+    deployment = {
+      inherit (config) publicKeyPath privateKeyPath; 
+    };
+  };
+
+  node = { monitor-ip, public-ip }: { pkgs, lib, ...}: {
+    image.name = "localhost/nixos-test";
+    nixos.useSystemd = true;
+    service.useHostStore = true;
+    out.service = {
+      networks.privatestorage.ipv4_address = public-ip;
+    };
+    nixos.configuration = {
+      imports = [
+        # Include the module from morph, which defines the
+        # `deployment` option.
+        "${pkgs.morph.lib}/options.nix"
+        gridlib.hardware-docker
+        ./secrets.nix
+        deployment
+      ];
+      config = {
+        system.stateVersion = lib.mkDefault "19.09";
+        monitoringvpnIPv4 = monitor-ip;
+      };
+    };
+  };
+  
+  storage-node = { monitor-ip, public-ip }@args: { pkgs, lib, ...}: {
+    imports = [ (node args) ];
+    nixos.configuration = {
+      imports = [
+        gridlib.storage
+        (gridlib.customize-storage config)
+      ];
+    };
+  };
+in
+{
+  services.storage1 = storage-node { monitor-ip = "172.23.23.12"; public-ip = "10.88.2.30"; };
+  services.storage2 = storage-node { monitor-ip = "172.23.23.13"; public-ip = "10.88.2.31"; };
+  services.payment = { pkgs, lib, ...}: {
+    imports = [ (node { monitor-ip = "172.23.23.11"; public-ip = "10.88.2.32"; }) ];
+    nixos.configuration = {
+      imports = [
+        gridlib.issuer
+          (gridlib.customize-issuer (config // {
+            monitoringvpnIPv4 = "172.23.23.11";
+            }))
+      ];
+    };
+  };
+  docker-compose.raw = {
+    networks.privatestorage = { name = "privatestorage"; external = true; };
+    volumes.nix = { name = "nix"; external = true; };
+  };
+}
diff --git a/morph/grid/local/arion-pkgs.nix b/morph/grid/local/arion-pkgs.nix
new file mode 100644
index 00000000..0c1f0648
--- /dev/null
+++ b/morph/grid/local/arion-pkgs.nix
@@ -0,0 +1,5 @@
+import <nixpkgs> {
+  # We specify the architecture explicitly. Use a Linux remote builder when
+  # calling arion from other platforms.
+  system = "x86_64-linux";
+}
diff --git a/morph/grid/local/grid.nix b/morph/grid/local/grid.nix
index 51f41832..e88111bd 100644
--- a/morph/grid/local/grid.nix
+++ b/morph/grid/local/grid.nix
@@ -18,56 +18,64 @@ let
       authorizedKey = builtins.readFile "${config.publicKeyPath}/deploy_key.pub";
       gridName = "local";
     };
+    services.private-storage.sshUsers = config.sshUsers;
+    deployment = {
+      inherit (config) publicKeyPath privateKeyPath; 
+    };
   };
 
   payments = {
     imports = [
       gridlib.issuer
-      (gridlib.hardware-virtual ({ publicIPv4 = "192.168.67.21"; }))
+      gridlib.hardware-virtual
       (gridlib.customize-issuer (config // {
           monitoringvpnIPv4 = "172.23.23.11";
       }))
       deployment
     ];
+    hardware-virtual.publicIPv4 = "192.168.67.21";
   };
 
   storage1 = {
     imports = [
       gridlib.storage
-      (gridlib.hardware-virtual ({ publicIPv4 = "192.168.67.22"; }))
+      gridlib.hardware-virtual
       (gridlib.customize-storage (config // {
         monitoringvpnIPv4 = "172.23.23.12";
-        stateVersion = "19.09";
       }))
       deployment
     ];
+    hardware-virtual.publicIPv4 = "192.168.67.22";
+    system.stateVersion = "19.09";
   };
 
   storage2 = {
     imports = [
       gridlib.storage
-      (gridlib.hardware-virtual ({ publicIPv4 = "192.168.67.23"; }))
+      gridlib.hardware-virtual
       (gridlib.customize-storage (config // {
         monitoringvpnIPv4 = "172.23.23.13";
-        stateVersion = "19.09";
       }))
       deployment
     ];
+    hardware-virtual.publicIPv4 = "192.168.67.23";
+    system.stateVersion = "19.09";
   };
 
   monitoring = {
     imports = [
       gridlib.monitoring
-      (gridlib.hardware-virtual ({ publicIPv4 = "192.168.67.24"; }))
+      gridlib.hardware-virtual
       (gridlib.customize-monitoring {
         inherit hostsMap vpnClientIPs nodeExporterTargets paymentExporterTargets;
-        inherit (config) domain publicKeyPath privateKeyPath sshUsers letsEncryptAdminEmail;
+        inherit (config) domain letsEncryptAdminEmail;
         googleOAuthClientID = config.monitoringGoogleOAuthClientID;
         monitoringvpnIPv4 = "172.23.23.1";
-        stateVersion = "19.09";
       })
       deployment
     ];
+    hardware-virtual.publicIPv4 = "192.168.67.24";
+    system.stateVersion = "19.09";
   };
 
   # TBD: derive these automatically:
diff --git a/morph/grid/local/public-keys/users.nix b/morph/grid/local/public-keys/users.nix
index 412077c0..e21002d4 100644
--- a/morph/grid/local/public-keys/users.nix
+++ b/morph/grid/local/public-keys/users.nix
@@ -1,4 +1,3 @@
 # Add your public key. Example:
-# let key = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHx7wJQNqKn8jOC4AxySRL2UxidNp7uIK9ad3pMb1ifF flo@fs-la";
-let key = undefined;
+let key = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHx7wJQNqKn8jOC4AxySRL2UxidNp7uIK9ad3pMb1ifF flo@fs-la";
 in { "root" = key; "vagrant" = key; }
diff --git a/morph/grid/local/secrets.nix b/morph/grid/local/secrets.nix
new file mode 100644
index 00000000..9866d6b8
--- /dev/null
+++ b/morph/grid/local/secrets.nix
@@ -0,0 +1,24 @@
+{ config, lib, pkgs, ... }@args:
+let
+  cfg = config.deployment;
+
+in {
+  # Force secrets to be in /etc/secrets instead of the default.
+  # Most modules default to `/run/keys` which is deleted on boot.
+  # Since the local private keys are in VCS anyway, this is safe.
+  options = {
+    deployment.secrets = lib.mkOption {
+      apply = lib.mapAttrs (k: v: v // {destination = "/etc/secrets/${k}";});
+    };
+  };
+
+  # Actually put the secrets into /etc/secrets
+  config = {
+    environment.etc = lib.mapAttrs'
+        (k: v: lib.nameValuePair "secrets/${k}" {
+          mode = "0444";
+          text = lib.readFile v.source;
+        })
+        cfg.secrets;
+  };
+}
diff --git a/morph/grid/production/grid.nix b/morph/grid/production/grid.nix
index 06eefdd2..3b5840d9 100644
--- a/morph/grid/production/grid.nix
+++ b/morph/grid/production/grid.nix
@@ -7,8 +7,6 @@ let
   config = rawConfig // {
     sshUsers = import ./public-keys/users.nix;
 
-    # Convert relative paths to absolute so library code can resolve names
-    # correctly.
     publicKeyPath = toString ./. + "/${rawConfig.publicKeyPath}";
     privateKeyPath = toString ./. + "/${rawConfig.privateKeyPath}";
   };
@@ -19,6 +17,10 @@ let
       authorizedKey = builtins.readFile "${config.publicKeyPath}/deploy_key.pub";
       gridName = "production";
     };
+    services.private-storage.sshUsers = config.sshUsers;
+    deployment = {
+      inherit (config) publicKeyPath privateKeyPath; 
+    };
   };
 
   payments = {
@@ -38,13 +40,13 @@ let
       gridlib.hardware-aws
       (gridlib.customize-monitoring {
         inherit hostsMap vpnClientIPs nodeExporterTargets paymentExporterTargets;
-        inherit (config) domain publicKeyPath privateKeyPath sshUsers letsEncryptAdminEmail;
+        inherit (config) domain letsEncryptAdminEmail;
         googleOAuthClientID = config.monitoringGoogleOAuthClientID;
         monitoringvpnIPv4 = "172.23.23.1";
-        stateVersion = "19.09";
       })
       deployment
     ];
+    system.stateVersion = "19.09";
   };
 
   defineStorageNode = name: { vpnIP, stateVersion }:
@@ -67,13 +69,13 @@ let
       # Then customize the storage system a little bit based on this node's particulars.
       (gridlib.customize-storage (config // nodecfg // {
         monitoringvpnIPv4 = vpnIP;
-        inherit stateVersion;
       }))
 
       # Also configure deployment management authorization
       deployment
     ];
 
+    system.stateVersion = stateVersion;
     # And supply configuration for those hardware / network / bootloader
     # options.  See the 100tb module for handling of this value.  The module
     # name is quoted because `1` makes `100tb` look an awful lot like a
diff --git a/morph/grid/testing/grid.nix b/morph/grid/testing/grid.nix
index 7b06c99e..09ab6fbf 100644
--- a/morph/grid/testing/grid.nix
+++ b/morph/grid/testing/grid.nix
@@ -7,8 +7,6 @@ let
   config = rawConfig // {
     sshUsers = import ./public-keys/users.nix;
 
-    # Convert relative paths to absolute so library code can resolve names
-    # correctly.
     publicKeyPath = toString ./. + "/${rawConfig.publicKeyPath}";
     privateKeyPath = toString ./. + "/${rawConfig.privateKeyPath}";
   };
@@ -19,6 +17,10 @@ let
       authorizedKey = builtins.readFile "${config.publicKeyPath}/deploy_key.pub";
       gridName = "testing";
     };
+    services.private-storage.sshUsers = config.sshUsers;
+    deployment = {
+      inherit (config) publicKeyPath privateKeyPath; 
+    };
   };
 
   payments = {
@@ -39,10 +41,10 @@ let
       ./testing001-hardware.nix
       (gridlib.customize-storage (config // {
         monitoringvpnIPv4 = "172.23.23.12";
-        stateVersion = "19.03";
       }))
       deployment
     ];
+    system.stateVersion = "19.03";
   };
 
   monitoring = {
@@ -51,13 +53,13 @@ let
       gridlib.hardware-aws
       (gridlib.customize-monitoring {
         inherit hostsMap vpnClientIPs nodeExporterTargets paymentExporterTargets;
-        inherit (config) domain publicKeyPath privateKeyPath sshUsers letsEncryptAdminEmail;
+        inherit (config) domain letsEncryptAdminEmail;
         googleOAuthClientID = config.monitoringGoogleOAuthClientID;
         monitoringvpnIPv4 = "172.23.23.1";
-        stateVersion = "19.09";
       })
       deployment
     ];
+    system.stateVersion = "19.09";
   };
 
   # TBD: derive these automatically:
diff --git a/morph/lib/customize-issuer.nix b/morph/lib/customize-issuer.nix
index 1c0d668f..e71543f1 100644
--- a/morph/lib/customize-issuer.nix
+++ b/morph/lib/customize-issuer.nix
@@ -1,22 +1,9 @@
 # Define a function which returns a value which fills in all the holes left by
 # ``issuer.nix``.
 {
-  # A path on the deployment system of a directory containing all of the
-  # public keys for the system.  For example, this holds Wireguard public keys
-  # for the VPN configuration and SSH public keys to configure SSH
-  # authentication.
-  publicKeyPath
-
-  # A path on the deployment system of a directory containing all of the
-  # corresponding private keys for the system.
-, privateKeyPath
-
   # A string giving the IP address and port number (":"-separated) of the VPN
   # server.
-, monitoringvpnEndpoint
-
-  # A string giving the VPN IPv4 address for this system.
-, monitoringvpnIPv4
+  monitoringvpnEndpoint
 
   # A string giving the domain name associated with this grid.  This is meant
   # to be combined with the hostname for this system to produce a
@@ -27,11 +14,6 @@
   # ``payments.example-grid.invalid`` is the name of this system.
 , domain
 
-  # A set mapping usernames as strings to SSH public keys as strings.  For
-  # each element of the site, the indicated user is configured on the system
-  # with the indicated SSH key as an authorized key.
-, sshUsers
-
   # A string giving an email address to use for Let's Encrypt registration and
   # certificate issuance.
 , letsEncryptAdminEmail
@@ -45,7 +27,12 @@
 , allowedChargeOrigins
 , ...
 }:
-{ config, ... }: {
+{ config, ... }: 
+let
+  inherit (config.deployment) publicKeyPath privateKeyPath;
+  inherit (config) monitoringvpnIPv4;
+in {
+  imports = [ ./deployment.nix ];
   # The morph default deployment target the name of the node in the network
   # attrset.  We don't always want to give the node its proper public address
   # there (because it depends on which domain is associated with the grid
@@ -54,30 +41,8 @@
   # qualified domain name.
   deployment.targetHost = "${config.networking.hostName}.${config.networking.domain}";
 
-  deployment.secrets = {
-    # A path on the deployment system to a file containing the Ristretto
-    # signing key.  This is used as the source of the Ristretto signing key
-    # morph secret.
-    "ristretto-signing-key".source = "${privateKeyPath}/ristretto.signing-key";
-
-    # A path on the deployment system to a file containing the Stripe secret
-    # key.  This is used as the source of the Stripe secret key morph secret.
-    "stripe-secret-key".source = "${privateKeyPath}/stripe.secret";
-
-    # ``.../monitoringvpn`` is a path on the deployment system of a directory
-    # containing a number of VPN-related secrets.  This is expected to contain
-    # a number of files named like ``<VPN IPv4 address>.key`` containing the
-    # VPN private key for the corresponding host.  It must also contain
-    # ``server.pub`` and ``preshared.key`` holding the VPN server's public key
-    # and the pre-shared key, respectively.  All of these things are used as
-    # the sources of various VPN-related morph secrets.
-    "monitoringvpn-secret-key".source = "${privateKeyPath}/monitoringvpn/${monitoringvpnIPv4}.key";
-    "monitoringvpn-preshared-key".source = "${privateKeyPath}/monitoringvpn/preshared.key";
-  };
-
   networking.domain = domain;
 
-  services.private-storage.sshUsers = sshUsers;
   services.private-storage.monitoring.vpn.client = {
     enable = true;
     ip = monitoringvpnIPv4;
diff --git a/morph/lib/customize-monitoring.nix b/morph/lib/customize-monitoring.nix
index 391aa560..6a811865 100644
--- a/morph/lib/customize-monitoring.nix
+++ b/morph/lib/customize-monitoring.nix
@@ -9,11 +9,8 @@
   hostsMap
 
   # See ``customize-issuer.nix``.
-, publicKeyPath
-, privateKeyPath
 , monitoringvpnIPv4
 , domain
-, sshUsers
 , letsEncryptAdminEmail
 
   # A list of VPN IP addresses as strings indicating which clients will be
@@ -36,11 +33,13 @@
   # logins to Grafana.
 , googleOAuthClientID
 
-  # A string giving the NixOS state version for the system.
-, stateVersion
 , ...
 }:
-{ config, ... }: {
+{ config, ... }:
+let
+  inherit (config.deployment) publicKeyPath privateKeyPath;
+in {
+  imports = [ ./deployment.nix ];
   # See customize-issuer.nix for an explanatoin of targetHost value.
   deployment.targetHost = "${config.networking.hostName}.${config.networking.domain}";
 
@@ -75,18 +74,12 @@
           action = ["sudo" "systemctl" "restart" "grafana.service"];
         };
       };
-    monitoringvpn = {
-      "monitoringvpn-private-key".source = "${privateKeyPath}/monitoringvpn/server.key";
-      "monitoringvpn-preshared-key".source = "${privateKeyPath}/monitoringvpn/preshared.key";
-    };
     in
-      grafanaSSO // monitoringvpn;
+      grafanaSSO;
 
   networking.domain = domain;
   networking.hosts = hostsMap;
 
-  services.private-storage.sshUsers = sshUsers;
-
   services.private-storage.monitoring.vpn.server = {
     enable = true;
     ip = monitoringvpnIPv4;
@@ -105,6 +98,4 @@
     inherit googleOAuthClientID;
     domain = "${config.networking.hostName}.${config.networking.domain}";
   };
-
-  system.stateVersion = stateVersion;
 }
diff --git a/morph/lib/customize-storage.nix b/morph/lib/customize-storage.nix
index 68655874..80510125 100644
--- a/morph/lib/customize-storage.nix
+++ b/morph/lib/customize-storage.nix
@@ -2,11 +2,7 @@
 # ``storage.nix``.
 {
   # See ``customize-issuer.nix``
-  privateKeyPath
-, publicKeyPath
-, monitoringvpnEndpoint
-, monitoringvpnIPv4
-, sshUsers
+  monitoringvpnEndpoint
 , domain
 
   # An integer giving the value of a single pass in byte×months.
@@ -16,24 +12,21 @@
   # advertisements and on which to listen for storage connections.
 , publicStoragePort
 
-  # A string giving the NixOS state version for the system.
-, stateVersion
 , ...
 }:
-{ config, ... }: {
+{ config, ... }: 
+let
+  inherit (config.deployment) publicKeyPath privateKeyPath;
+  inherit (config) monitoringvpnIPv4;
+in {
+  imports = [ ./deployment.nix ];
   # See customize-issuer.nix for an explanatoin of targetHost value.
   deployment.targetHost = "${config.networking.hostName}.${config.networking.domain}";
 
-  deployment.secrets = {
-    "ristretto-signing-key".source = "${privateKeyPath}/ristretto.signing-key";
-    "monitoringvpn-secret-key".source = "${privateKeyPath}/monitoringvpn/${monitoringvpnIPv4}.key";
-    "monitoringvpn-preshared-key".source = "${privateKeyPath}/monitoringvpn/preshared.key";
-  };
-
   networking.domain = domain;
 
   services.private-storage = {
-    inherit sshUsers passValue publicStoragePort;
+    inherit passValue publicStoragePort;
   };
 
   services.private-storage.monitoring.vpn.client = {
@@ -42,6 +35,4 @@
     endpoint = monitoringvpnEndpoint;
     endpointPublicKeyFile = "${publicKeyPath}/monitoringvpn/server.pub";
   };
-
-  system.stateVersion = stateVersion;
 }
diff --git a/morph/lib/default.nix b/morph/lib/default.nix
index bdd92f4b..3c620a04 100644
--- a/morph/lib/default.nix
+++ b/morph/lib/default.nix
@@ -4,6 +4,7 @@
 {
   hardware-aws = import ./issuer-aws.nix;
   hardware-virtual = import ./hardware-virtual.nix;
+  hardware-docker = import ./hardware-docker.nix;
 
   issuer = import ./issuer.nix;
   customize-issuer = import ./customize-issuer.nix;
diff --git a/morph/lib/deployment.nix b/morph/lib/deployment.nix
new file mode 100644
index 00000000..0e4fc8b0
--- /dev/null
+++ b/morph/lib/deployment.nix
@@ -0,0 +1,24 @@
+
+{ lib, config, ... }:
+let
+  cfg = config.hardware-virtual;
+in {
+  options.deployment = {
+    publicKeyPath = lib.mkOption {
+      type = lib.types.path;
+      description = ''
+      A path on the deployment system of a directory containing all of the
+      public keys for the system.  For example, this holds Wireguard public keys
+      for the VPN configuration and SSH public keys to configure SSH
+      authentication.
+      '';
+    };
+    privateKeyPath = lib.mkOption {
+      type = lib.types.path;
+      description = ''
+      A path on the deployment system of a directory containing all of the
+      corresponding private keys for the system.
+      '';
+    };
+  };
+}
diff --git a/morph/lib/hardware-docker.nix b/morph/lib/hardware-docker.nix
new file mode 100644
index 00000000..7dc35a9f
--- /dev/null
+++ b/morph/lib/hardware-docker.nix
@@ -0,0 +1,33 @@
+{ modulesPath, pkgs, config, lib, ... }:
+let
+in {
+  imports = [
+    "${modulesPath}/virtualisation/docker-image.nix"
+  ];
+
+  config = {
+    environment.systemPackages = with pkgs; [
+      bashInteractive
+    ];
+
+    nix.readOnlyStore = false;
+    boot.postBootCommands = lib.mkBefore ''
+    mkdir -p /run/systemd
+    '';
+    # From https://github.com/hercules-ci/arion/blob/master/src/nix/modules/nixos/container-systemd.nix 
+    
+    boot.isContainer = true;
+    boot.specialFileSystems = lib.mkForce {};
+
+    services.journald.console = "/dev/console";
+
+    systemd.services.systemd-logind.enable = false;
+    systemd.services.console-getty.enable = false;
+
+    systemd.sockets.nix-daemon.enable = lib.mkDefault false;
+    systemd.services.nix-daemon.enable = lib.mkDefault false;
+    # From https://github.com/hercules-ci/arion/blob/master/examples/full-nixos/arion-compose.nix
+    services.nscd.enable = false;
+    system.nssModules = lib.mkForce [];
+  };
+}
diff --git a/morph/lib/hardware-virtual.nix b/morph/lib/hardware-virtual.nix
index cf158279..37a1a12e 100644
--- a/morph/lib/hardware-virtual.nix
+++ b/morph/lib/hardware-virtual.nix
@@ -1,36 +1,46 @@
-{ publicIPv4, ... }:
-{
+{ lib, config, ... }:
+let
+  cfg = config.hardware-virtual;
+in {
   imports = [ ./vagrant-guest.nix ];
+  options.hardware-virtual = {
+     publicIPv4 = lib.mkOption {
+       type = lib.types.str;
+       example = lib.literalExample "192.0.2.0";
+     };
+  };
 
-  virtualisation.virtualbox.guest.enable = true;
+  config = {
+    virtualisation.virtualbox.guest.enable = true;
 
-  # Use the GRUB 2 boot loader.
-  boot.loader.grub.enable = true;
-  boot.loader.grub.version = 2;
-  boot.loader.grub.device = "/dev/sda";
+    # Use the GRUB 2 boot loader.
+    boot.loader.grub.enable = true;
+    boot.loader.grub.version = 2;
+    boot.loader.grub.device = "/dev/sda";
 
-  boot.initrd.availableKernelModules = [ "ata_piix" "sd_mod" "sr_mod" ];
-  boot.initrd.kernelModules = [ ];
-  boot.kernel.sysctl = { "vm.swappiness" = 0; };
-  boot.kernelModules = [ ];
-  boot.extraModulePackages = [ ];
+    boot.initrd.availableKernelModules = [ "ata_piix" "sd_mod" "sr_mod" ];
+    boot.initrd.kernelModules = [ ];
+    boot.kernel.sysctl = { "vm.swappiness" = 0; };
+    boot.kernelModules = [ ];
+    boot.extraModulePackages = [ ];
 
-  # remove the fsck that runs at startup. It will always fail to run, stopping
-  # your boot until you press *.
-  boot.initrd.checkJournalingFS = false;
+    # remove the fsck that runs at startup. It will always fail to run, stopping
+    # your boot until you press *.
+    boot.initrd.checkJournalingFS = false;
 
-  networking.interfaces.enp0s8.ipv4.addresses = [{
-    address = publicIPv4;
-    prefixLength = 24;
-  }];
+    networking.interfaces.enp0s8.ipv4.addresses = [{
+      address = cfg.publicIPv4;
+      prefixLength = 24;
+    }];
 
-  fileSystems."/storage" = { fsType = "tmpfs"; };
-  fileSystems."/" =
-    { device = "/dev/sda1";
-      fsType = "ext4";
-    };
-  swapDevices = [ ];
+    fileSystems."/storage" = { fsType = "tmpfs"; };
+    fileSystems."/" =
+      { device = "/dev/sda1";
+        fsType = "ext4";
+      };
+    swapDevices = [ ];
 
-  # We want to push packages with morph without having to sign them
-  nix.trustedUsers = [ "@wheel" "root" "vagrant" ];
+    # We want to push packages with morph without having to sign them
+    nix.trustedUsers = [ "@wheel" "root" "vagrant" ];
+  };
 }
diff --git a/morph/lib/issuer.nix b/morph/lib/issuer.nix
index f617eef1..9b62a808 100644
--- a/morph/lib/issuer.nix
+++ b/morph/lib/issuer.nix
@@ -4,41 +4,12 @@
 # statically known.  This value is suitable for use as a module to be imported
 # into a more complete system configuration.  It is expected that the holes
 # will be filled by a sibling module created by ``customize-issuer.nix``.
-{ config, ...}:
-{
-  deployment = {
-    secrets = {
-      "ristretto-signing-key" = {
-        destination = "/run/keys/ristretto.signing-key";
-        owner.user = "root";
-        owner.group = "root";
-        permissions = "0400";
-        action = ["sudo" "systemctl" "restart" "zkapissuer.service"];
-      };
-      "stripe-secret-key" = {
-        destination = "/run/keys/stripe.secret-key";
-        owner.user = "root";
-        owner.group = "root";
-        permissions = "0400";
-        action = ["sudo" "systemctl" "restart" "zkapissuer.service"];
-      };
-
-      "monitoringvpn-secret-key" = {
-        destination = "/run/keys/monitoringvpn/client.key";
-        owner.user = "root";
-        owner.group = "root";
-        permissions = "0400";
-        action = ["sudo" "systemctl" "restart" "wireguard-monitoringvpn.service"];
-      };
-      "monitoringvpn-preshared-key" = {
-        destination = "/run/keys/monitoringvpn/preshared.key";
-        owner.user = "root";
-        owner.group = "root";
-        permissions = "0400";
-        action = ["sudo" "systemctl" "restart" "wireguard-monitoringvpn.service"];
-      };
-    };
-  };
+{ lib, config, ...}:
+let
+  inherit (config.deployment) publicKeyPath privateKeyPath;
+  inherit (config) monitoringvpnIPv4;
+in {
+  options.monitoringvpnIPv4 = lib.mkOption {};
 
   imports = [
     # Allow us to remotely trigger updates to this system.
@@ -49,12 +20,52 @@
     ../../nixos/modules/monitoring/exporters/node.nix
   ];
 
-  services.private-storage-issuer = {
-    enable = true;
-    tls = true;
-    ristrettoSigningKeyPath = config.deployment.secrets.ristretto-signing-key.destination;
-    stripeSecretKeyPath = config.deployment.secrets.stripe-secret-key.destination;
-    database = "SQLite3";
-    databasePath = "/var/db/vouchers.sqlite3";
+  config = {
+    deployment = {
+      secrets = {
+        "ristretto-signing-key" = {
+          destination = "/run/keys/ristretto.signing-key";
+          source = "${privateKeyPath}/ristretto.signing-key";
+          owner.user = "root";
+          owner.group = "root";
+          permissions = "0400";
+          action = ["sudo" "systemctl" "restart" "zkapissuer.service"];
+        };
+        "stripe-secret-key" = {
+          destination = "/run/keys/stripe.secret-key";
+          source = "${privateKeyPath}/stripe.secret";
+          owner.user = "root";
+          owner.group = "root";
+          permissions = "0400";
+          action = ["sudo" "systemctl" "restart" "zkapissuer.service"];
+        };
+
+        "monitoringvpn-secret-key" = {
+          destination = "/run/keys/monitoringvpn/client.key";
+          source = "${privateKeyPath}/monitoringvpn/${monitoringvpnIPv4}.key";
+          owner.user = "root";
+          owner.group = "root";
+          permissions = "0400";
+          action = ["sudo" "systemctl" "restart" "wireguard-monitoringvpn.service"];
+        };
+        "monitoringvpn-preshared-key" = {
+          destination = "/run/keys/monitoringvpn/preshared.key";
+          source = "${privateKeyPath}/monitoringvpn/preshared.key";
+          owner.user = "root";
+          owner.group = "root";
+          permissions = "0400";
+          action = ["sudo" "systemctl" "restart" "wireguard-monitoringvpn.service"];
+        };
+      };
+    };
+
+    services.private-storage-issuer = {
+      enable = true;
+      tls = true;
+      ristrettoSigningKeyPath = config.deployment.secrets.ristretto-signing-key.destination;
+      stripeSecretKeyPath = config.deployment.secrets.stripe-secret-key.destination;
+      database = "SQLite3";
+      databasePath = "/var/db/vouchers.sqlite3";
+    };
   };
 }
diff --git a/morph/lib/monitoring.nix b/morph/lib/monitoring.nix
index 7d59c296..8dedab10 100644
--- a/morph/lib/monitoring.nix
+++ b/morph/lib/monitoring.nix
@@ -5,6 +5,7 @@
     secrets = {
       "monitoringvpn-private-key" = {
         destination = "/run/keys/monitoringvpn/server.key";
+	source = "${privateKeyPath}/monitoringvpn/server.key";
         owner.user = "root";
         owner.group = "root";
         permissions = "0400";
@@ -12,6 +13,7 @@
       };
       "monitoringvpn-preshared-key" = {
         destination = "/run/keys/monitoringvpn/preshared.key";
+	source = "${privateKeyPath}/monitoringvpn/preshared.key";
         owner.user = "root";
         owner.group = "root";
         permissions = "0400";
diff --git a/morph/lib/storage.nix b/morph/lib/storage.nix
index 52be8136..a127e089 100644
--- a/morph/lib/storage.nix
+++ b/morph/lib/storage.nix
@@ -1,35 +1,11 @@
 # Similar to ``issuer.nix`` but for a "storage"-type system.  Holes are filled
 # by ``customize-storage.nix``.
-{ config, ...} :
-{
-  deployment = {
-    secrets = {
-      "ristretto-signing-key" = {
-        destination = "/run/keys/ristretto.signing-key";
-        owner.user = "root";
-        owner.group = "root";
-        permissions = "0400";
-        # Service name here matches the name defined by our tahoe-lafs nixos
-        # module.  It would be nice to not have to hard-code it here.  Can we
-        # extract it from the tahoe-lafs nixos module somehow?
-        action = ["sudo" "systemctl" "restart" "tahoe.storage.service"];
-      };
-      "monitoringvpn-secret-key" = {
-        destination = "/run/keys/monitoringvpn/client.key";
-        owner.user = "root";
-        owner.group = "root";
-        permissions = "0400";
-        action = ["sudo" "systemctl" "restart" "wireguard-monitoringvpn.service"];
-      };
-      "monitoringvpn-preshared-key" = {
-        destination = "/run/keys/monitoringvpn/preshared.key";
-        owner.user = "root";
-        owner.group = "root";
-        permissions = "0400";
-        action = ["sudo" "systemctl" "restart" "wireguard-monitoringvpn.service"];
-      };
-    };
-  };
+{ lib, config, ...} :
+let
+  inherit (config.deployment) publicKeyPath privateKeyPath;
+  inherit (config) monitoringvpnIPv4;
+in {
+  options.monitoringvpnIPv4 = lib.mkOption {};
 
   # Any extra NixOS modules to load on this server.
   imports = [
@@ -42,13 +18,48 @@
     ../../nixos/modules/monitoring/vpn/client.nix
     # Expose base system metrics over the monitoringvpn.
     ../../nixos/modules/monitoring/exporters/node.nix
+    ./deployment.nix
   ];
 
-  # Turn on the Private Storage (Tahoe-LAFS) service.
-  services.private-storage = {
-    # Yep.  Turn it on.
-    enable = true;
-    # Give it the Ristretto signing key to support authorization.
-    ristrettoSigningKeyPath = config.deployment.secrets.ristretto-signing-key.destination;
+  config = {
+    deployment = {
+      secrets = {
+        "ristretto-signing-key" = {
+          destination = "/run/keys/ristretto.signing-key";
+          source = "${privateKeyPath}/ristretto.signing-key";
+          owner.user = "root";
+          owner.group = "root";
+          permissions = "0400";
+          # Service name here matches the name defined by our tahoe-lafs nixos
+          # module.  It would be nice to not have to hard-code it here.  Can we
+          # extract it from the tahoe-lafs nixos module somehow?
+          action = ["sudo" "systemctl" "restart" "tahoe.storage.service"];
+        };
+        "monitoringvpn-secret-key" = {
+          destination = "/run/keys/monitoringvpn/client.key";
+          source = "${privateKeyPath}/monitoringvpn/${monitoringvpnIPv4}.key";
+          owner.user = "root";
+          owner.group = "root";
+          permissions = "0400";
+          action = ["sudo" "systemctl" "restart" "wireguard-monitoringvpn.service"];
+        };
+        "monitoringvpn-preshared-key" = {
+          destination = "/run/keys/monitoringvpn/preshared.key";
+          source = "${privateKeyPath}/monitoringvpn/preshared.key";
+          owner.user = "root";
+          owner.group = "root";
+          permissions = "0400";
+          action = ["sudo" "systemctl" "restart" "wireguard-monitoringvpn.service"];
+        };
+      };
+    };
+
+    # Turn on the Private Storage (Tahoe-LAFS) service.
+    services.private-storage = {
+      # Yep.  Turn it on.
+      enable = true;
+      # Give it the Ristretto signing key to support authorization.
+      ristrettoSigningKeyPath = config.deployment.secrets.ristretto-signing-key.destination;
+    };
   };
 }
diff --git a/shell.nix b/shell.nix
index f3d2750e..09a57466 100644
--- a/shell.nix
+++ b/shell.nix
@@ -5,8 +5,9 @@ in
 pkgs.mkShell {
   NIX_PATH = "nixpkgs=${pkgs.path}";
   buildInputs = [
+    pkgs.arion
+    pkgs.jp
     pkgs.morph
     pkgs.vagrant
-    pkgs.jp
   ];
 }
-- 
GitLab